Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10The-MALWAR...ot.exe
windows10-ltsc 2021-x64
10The-MALWAR...ll.exe
windows10-ltsc 2021-x64
10The-MALWAR...BS.exe
windows10-ltsc 2021-x64
10The-MALWAR...in.exe
windows10-ltsc 2021-x64
7The-MALWAR....A.exe
windows10-ltsc 2021-x64
7The-MALWAR....A.exe
windows10-ltsc 2021-x64
10The-MALWAR...us.exe
windows10-ltsc 2021-x64
6The-MALWAR....a.exe
windows10-ltsc 2021-x64
3The-MALWAR....a.exe
windows10-ltsc 2021-x64
7The-MALWAR...ok.exe
windows10-ltsc 2021-x64
1The-MALWAR...ft.exe
windows10-ltsc 2021-x64
4The-MALWAR...en.exe
windows10-ltsc 2021-x64
6The-MALWAR...ul.exe
windows10-ltsc 2021-x64
3The-MALWAR....a.exe
windows10-ltsc 2021-x64
7The-MALWAR...99.exe
windows10-ltsc 2021-x64
5The-MALWAR...ay.exe
windows10-ltsc 2021-x64
7The-MALWAR....e.exe
windows10-ltsc 2021-x64
7The-MALWAR...on.exe
windows10-ltsc 2021-x64
7The-MALWAR....d.exe
windows10-ltsc 2021-x64
7The-MALWAR...tr.exe
windows10-ltsc 2021-x64
3The-MALWAR....a.exe
windows10-ltsc 2021-x64
5The-MALWAR...ri.exe
windows10-ltsc 2021-x64
3The-MALWAR...en.exe
windows10-ltsc 2021-x64
3The-MALWAR...ur.exe
windows10-ltsc 2021-x64
5The-MALWAR...ld.exe
windows10-ltsc 2021-x64
3The-MALWAR....A.exe
windows10-ltsc 2021-x64
10The-MALWAR....a.exe
windows10-ltsc 2021-x64
3The-MALWAR...fe.exe
windows10-ltsc 2021-x64
3The-MALWAR....E.exe
windows10-ltsc 2021-x64
5The-MALWAR...hu.exe
windows10-ltsc 2021-x64
3The-MALWAR...in.exe
windows10-ltsc 2021-x64
4The-MALWAR...mo.exe
windows10-ltsc 2021-x64
6Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04/01/2025, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Email-Worm/Amus.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Email-Worm/Anap.a.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Email-Worm/Axam.a.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Email-Worm/Brontok.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Email-Worm/Bugsoft.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Email-Worm/Duksten.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Email-Worm/Funsoul.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Email-Worm/Gruel.a.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Email-Worm/Happy99.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Email-Worm/Kiray.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Email-Worm/Klez.e.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Email-Worm/Lacon.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Email-Worm/Lentin/Lentin.d.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Email-Worm/Magistr.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Email-Worm/Maldal.a.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Email-Worm/Mari.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Email-Worm/MeltingScreen.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Email-Worm/Merkur.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Email-Worm/MsWorld.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Email-Worm/MyDoom.A.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Email-Worm/MyPics.a.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Email-Worm/NakedWife.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/Email-Worm/Nyxem.E.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/Email-Worm/Pikachu.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/Email-Worm/Prolin.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/Email-Worm/Quamo.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
The-MALWARE-Repo-master/Email-Worm/Amus.exe
-
Size
50KB
-
MD5
47abd68080eee0ea1b95ae31968a3069
-
SHA1
ffbdf4b2224b92bd78779a7c5ac366ccb007c14d
-
SHA256
b5fc4fd50e4ba69f0c8c8e5c402813c107c605cab659960ac31b3c8356c4e0ec
-
SHA512
c9dfabffe582b29e810db8866f8997af1bd3339fa30e79575377bde970fcad3e3b6e9036b3a88d0c5f4fa3545eea8904d9faabf00142d5775ea5508adcd4dc0a
-
SSDEEP
768:/9NC1eO7wvsgyjgLCtKbqvYGjaESiKMH6BJJE+XqYq7wvefY:/9NC1eOMFyjt2/wDrcq/Mveg
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microzoft_Ofiz = "C:\\Windows\\KdzEregli.exe" Amus.exe -
Drops file in Windows directory 20 IoCs
description ioc Process File created C:\Windows\My_Pictures.exe Amus.exe File opened for modification C:\Windows\Meydanbasi.exe Amus.exe File created C:\Windows\Pide.exe Amus.exe File created C:\Windows\Cekirge.exe Amus.exe File opened for modification C:\Windows\Ankara.exe Amus.exe File created C:\Windows\KdzEregli.exe Amus.exe File opened for modification C:\Windows\Messenger.exe Amus.exe File opened for modification C:\Windows\Cekirge.exe Amus.exe File created C:\Windows\Ankara.exe Amus.exe File opened for modification C:\Windows\Adapazari.exe Amus.exe File opened for modification C:\Windows\Pire.exe Amus.exe File created C:\Windows\Anti_Virus.exe Amus.exe File opened for modification C:\Windows\KdzEregli.exe Amus.exe File created C:\Windows\Messenger.exe Amus.exe File created C:\Windows\Meydanbasi.exe Amus.exe File opened for modification C:\Windows\Pide.exe Amus.exe File created C:\Windows\Pire.exe Amus.exe File opened for modification C:\Windows\My_Pictures.exe Amus.exe File created C:\Windows\Adapazari.exe Amus.exe File opened for modification C:\Windows\Anti_Virus.exe Amus.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amus.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2280 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2280 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1020 Amus.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\Amus.exe"C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\Amus.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1020
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x50c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD547abd68080eee0ea1b95ae31968a3069
SHA1ffbdf4b2224b92bd78779a7c5ac366ccb007c14d
SHA256b5fc4fd50e4ba69f0c8c8e5c402813c107c605cab659960ac31b3c8356c4e0ec
SHA512c9dfabffe582b29e810db8866f8997af1bd3339fa30e79575377bde970fcad3e3b6e9036b3a88d0c5f4fa3545eea8904d9faabf00142d5775ea5508adcd4dc0a